
Cyber Risk Update 4 NOV 2022
Ransomware Is A Global Problem And Getting Worse. The White House has united dozens of nations and representatives from big tech...


Managing Cyber Risks in Today's Digital Age: Insights from PwC Pulse Survey
In today's digital age, businesses face a myriad of risks that can disrupt operations and damage reputation. With the rapid pace of...

The Local Government Officials Guide to Cybersecurity
Ron, Cesar, and I (Don) are currently collaborating on a new professional guide for executives in local government on the topic of...

The Crucial Role of CISOs in Local Governments: Ensuring Good Governance and Cybersecurity
"The single biggest threat to cybersecurity is misunderstanding." - ANSI ISA In recent years, the importance of cybersecurity has become...

Three Cybersecurity Bad Practices You Should Avoid to Protect Your Organization
What Not To Do: The CISA's Bad Practices In today's digital age, cybersecurity is critical to the smooth functioning of organizations,...

Does Security Awareness Work?
According to the Verizon 2018 Data Breach Report, 93% of data breaches are linked to phishing or social engineering. With stats like...

Where Cybercrime Goes to Hide
Here is a Norton documentary on bulletproof hosting services. Pick where you want to host your data where it is most legally beneficial...


Protect Yourself from Internet Dangers
Protect yourself from Internet Dangers. Learn how to protect yourself at home and at work from the dangers of the Internet, including...


Measuring Security Performance: 3 Techniques You Need to Know
Measuring security performance is critical for any organization to identify vulnerabilities, mitigate potential risks, and improve...

Five Challenges of Computer Security
A Paper I wrote for American Military University, Criminal Justice Department Introduction After a recent lecture on information systems...